Roundcube Webmail, the web-based mail client who has been with millions of servers for years and who since 2008 has been integrated as a default interface in cPanel, was again placed at the centre of attention for reasons that any system manager should take seriously. The United States Infrastructure and Cybersecurity Agency (CISA) recently added two Roundcube failures to its catalogue of nature-exploited vulnerabilities and gave strict instructions for federal agencies to apply patches urgently.
The first noted failure allows remote code execution and is recorded as CVE-2025-49113. It was patched by Roundcube's officials, but researchers and monitoring organizations detected exploitation shortly after the correction was published, which motivated public alerts on tens of thousands of exposed facilities. The second problem, CVE-2025-68461, is a vulnerability of cross-site scribing (XSS) that abuses the animate label in SVG documents and that also has patch available from the versions that Roundcube published to correct it.

To contextualize the magnitude of the risk: search engines oriented to Internet-connected devices such as Shodan show tens of thousands of Roundcube instances accessible from the public network - a figure that indicates the enormous potential scope of any critical vulnerability in this software. See the public search for Shodan related to Roundcube Here..
CISA formalized the concern in an official alert in which it included both failures in its public communication and added the entries to the A catalogue of known and exploited vulnerabilities (KEV), a list the agency uses to prioritize defensive actions in the public sector. In addition, CISA recalled that there are other historical vulnerabilities in Roundcube that have been exploited by malicious actors, and that is why it included this family of failures in its continuous follow-up.
The federal government's response was rapid in terms of demand: through the binding operational directive known as BOD 22-01 Federal civil agencies were ordered to complete the necessary mitigation within three weeks. That hurry is not casual: vulnerabilities in web mail interfaces are attractive to criminals and state-sponsored groups because they offer relatively direct access to conversations and credentials, and because many facilities remain exposed for long periods.
Roundcube officials published corrections that organizations must adopt as soon as possible; the corrective versions for the supported branches are available on the official project channels and in the launch repositories. If you manage Roundcube servers, it is essential to update to the versions that include patches, review records for possible unauthorized access and minimize public exposure of the interface where possible. The project launch repository in GitHub is available for access to publications and official versions: Roundcube - Releases.
This is not the first time Roundcube has served as a vector for sophisticated campaigns. Historically, actors with political or criminal motivations have exploited failures of this software to spy on administrations and organizations. This pattern - public failure, patch and operation in a few days - highlights a simple but painful reality: the window between the publication of a patch and its effective deployment remains the main weakness in the safety of many infrastructure.

From a practical point of view, updating as soon as possible is the essential measure. In addition, it is appropriate to tighten the exposure of web mail interfaces through access rules, strong authentication, log monitoring and commitment indicators analysis. It is also recommended that security officials consult official intelligence sources and catalogues, such as the CISA list mentioned above, to prioritize actions based on the real risk and presence of the software in their environment.
The lesson that this episode leaves is clear: even widely deployed and long-standing tools can become a systemic risk if the updates are not applied quickly and if the telemetry on their exposure is not integrated into the security processes. Keeping the software up to date, reducing the exposed surface and actively monitoring environments are practical that together make the difference between a protected patch and a patch that comes too late.
Recommended sources and readings: the entry of CISA on the inclusion of these vulnerabilities in its catalogue Here., technical details at the National Vulnerability Database for CVE-2025-49113 and CVE-2025-68461, the public search for Roundcube's Shodan and the official Roundcube launch repository in GitHub.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...

PinTheft the public explosion that could give you root on Arch Linux
A new public explosion has brought to the surface again the fragility of the Linux privilege model: the V12 Security team named the failure as PinTheft and published a concept t...